cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-30211,https://securityvulnerability.io/vulnerability/CVE-2024-30211,Improper Access Control in Intel ME Driver Pack Installer Engines,"An improper access control vulnerability exists in Intel ME driver pack installer engines prior to version 2422.6.2.0. This issue may allow an authenticated user to execute actions that would otherwise be restricted, potentially enabling escalation of privileges through local access. Organizations using affected versions should prioritize updating to mitigate risks associated with this vulnerability.",Intel,Intel(r) Me Driver Pack Installer Engines,5.3,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:20.874Z,0 CVE-2024-36274,https://securityvulnerability.io/vulnerability/CVE-2024-36274,Out-of-Bounds Write Vulnerability in Intel Ethernet Driver,"An out-of-bounds write vulnerability exists in the Intel 800 Series Ethernet Driver for Intel Ethernet Adapter Complete Driver Pack versions before 29.1. This flaw may allow an unauthenticated user to trigger a denial of service condition through adjacent access, impacting system stability and functionality. Immediate attention is recommended to mitigate potential risks associated with this vulnerability.",Intel,Intel(r) 800 Series Ethernet Driver For Intel(r) Ethernet Adapter Complete Driver Pack,7.1,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:11.420Z,0 CVE-2024-24852,https://securityvulnerability.io/vulnerability/CVE-2024-24852,Uncontrolled Search Path in Intel Ethernet Adapter Driver Pack,"The vulnerability arises due to an uncontrolled search path in the Intel Ethernet Adapter Complete Driver Pack, potentially allowing authenticated users to escalate privileges through local access before version 29.1. Proper validation and restrictions are critical to safeguarding system integrity and user permissions.",Intel,Intel(r) Ethernet Adapter Complete Driver Pack,5.4,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:09.556Z,0 CVE-2024-39286,https://securityvulnerability.io/vulnerability/CVE-2024-39286,Linux Kernel Mode Driver Vulnerability in Intel 800 Series Ethernet Driver,"The Intel 800 Series Ethernet Driver prior to version 1.15.4 contains a vulnerability in its Linux kernel mode driver that allows authenticated users to exploit incorrect execution-assigned permissions. This could potentially lead to unauthorized information disclosure via local access, posing a significant risk to system integrity and confidentiality.",Intel,Intel(r) 800 Series Ethernet Driver,2,LOW,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:18:59.246Z,0 CVE-2024-42410,https://securityvulnerability.io/vulnerability/CVE-2024-42410,Input Validation Flaw in Intel Core Graphics Drivers,"An issue in certain versions of Intel Graphics Drivers allows an authenticated user to exploit improper input validation. This flaw could enable a local denial of service condition, impacting system stability and availability. Users are advised to review security advisories and update their drivers to mitigate potential risks.",Intel,Intel(r) Graphics Drivers,6.8,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:18:50.452Z,0 CVE-2024-38310,https://securityvulnerability.io/vulnerability/CVE-2024-38310,Improper Access Control in Intel Graphics Driver Installers,An improper access control vulnerability exists in Intel Graphics Driver software installers that may allow an authenticated user to potentially escalate privileges using local access. This issue highlights the importance of securing installation processes to prevent unauthorized access and manipulation by users with limited rights.,Intel,Intel(r) Graphics Driver Software Installers,5.4,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:18:48.842Z,0 CVE-2024-36488,https://securityvulnerability.io/vulnerability/CVE-2024-36488,Potential Escalation of Privilege Vulnerability in Intel DSA,"An improper access control vulnerability exists in certain versions of Intel DSA that allows an authenticated user to potentially escalate privileges through local access. This flaw impacts users by presenting the risk of unauthorized access to system privileges. Affected versions include those prior to 24.3.26.8, emphasizing the importance of upgrading to the latest release to mitigate the potential risks associated with this vulnerability.",Intel,Driver \& Support Assistant,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-11-13T21:15:00.000Z,0 CVE-2024-36294,https://securityvulnerability.io/vulnerability/CVE-2024-36294,Potential Escalation of Privilege via Local Access,"The vulnerability found in Intel DSA software prior to version 24.3.26.8 involves insecure inherited permissions that may allow an authenticated user with local access to escalate their privileges. This flaw could potentially lead to unauthorized actions within the affected systems, posing a significant risk to the integrity of applications utilizing the software.",Intel,Driver \& Support Assistant,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-11-13T21:15:00.000Z,0 CVE-2024-22376,https://securityvulnerability.io/vulnerability/CVE-2024-22376,Uncontrolled Search Path Element Vulnerability in Intel Ethernet Adapter Driver Package,"The vulnerability allows an authenticated user to exploit an uncontrolled search path element in earlier versions of the Intel Ethernet Adapter Driver Pack, granting potential escalation of privilege through local access. Attackers may manipulate the driver search paths, leading to unauthorized system access and execution of arbitrary code. Users are advised to upgrade to version 28.3 or later to mitigate this risk.",Intel,Installation Software For Intel(r) Ethernet Adapter Driver Pack,6.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-08-14T13:45:25.960Z,0 CVE-2022-37410,https://securityvulnerability.io/vulnerability/CVE-2022-37410,Potential Escalation of Privilege Vulnerability in Intel Thunderbolt Driver Software,"The vulnerability pertains to improper access control in Intel Thunderbolt driver software, which affects versions prior to 89. An authenticated user may exploit this issue to potentially escalate their privileges through local access to the system. This vulnerability raises significant security concerns, particularly in environments where multiple users have proportional access to devices. Proper application of security patches and guidance from Intel's advisory is essential to mitigate related risks.",Intel,Intel(r) Thunderbolt Driver Software,7,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-05-16T20:47:43.732Z,0 CVE-2023-43751,https://securityvulnerability.io/vulnerability/CVE-2023-43751,Potential Escalation of Privilege via Local Access in Intel(R) Graphics Command Center Service,"The Intel Graphics Command Center Service is affected by a vulnerability allowing an authenticated user to potentially escalate privileges via local access due to an uncontrolled search path in the bundled Intel Graphics Windows DCH driver software. This issue can lead to unauthorized access and manipulation of system resources, highlighting the importance of keeping drivers up-to-date to mitigate security risks.",Intel,Intel(r) Graphics Windows Dch Driver Software,6.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-05-16T20:47:39.645Z,0 CVE-2023-42668,https://securityvulnerability.io/vulnerability/CVE-2023-42668,Incorrect Default Permissions May Allow Escalation of Privilege via Local Access,"The vulnerability pertains to the onboard video driver software used in Intel Server Boards configured with the Intel 62X Chipset. Prior to version 1.14, this software contained incorrect default permissions, which could allow an authenticated user to exploit local access and potentially escalate their privileges within the system. This might lead to unauthorized access and control over system resources, raising serious security concerns for environments using these components. Administrators are advised to review their installations and apply necessary security patches.",Intel,Onboard Video Driver Software For Intel(r) Server Boards Based On Intel(r) 62x Chipset,6.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-05-16T20:47:38.978Z,0 CVE-2024-22015,https://securityvulnerability.io/vulnerability/CVE-2024-22015,Potential Denial of Service Vulnerability in Intel DLB Driver Software Prior to Version 8.5.0,"A security flaw exists in the Intel Data Streaming Accelerator (DLB) driver software prior to version 8.5.0, stemming from improper input validation. This vulnerability allows an authenticated user to potentially initiate a denial of service condition by accessing the system locally. The flaw highlights the importance of robust input validation processes to mitigate such risks. Users of the impacted product are advised to review security advisories and update their software to the latest version to enhance their security posture.",Intel,Intel(r) Dlb Driver Software,6.5,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-05-16T20:47:36.565Z,0 CVE-2023-50197,https://securityvulnerability.io/vulnerability/CVE-2023-50197,Intel Driver & Support Assistant Link Following Local Privilege Escalation Vulnerability,"A locally exploitable vulnerability has been identified within the Intel Driver & Support Assistant that allows attackers to escalate their privileges. This vulnerability arises from how the DSA Service handles symbolic links. By creating a malicious symbolic link, an attacker can manipulate the service to write a file in unexpected locations. Successfully exploiting this vulnerability grants the attacker the ability to execute arbitrary code with elevated privileges in the context of the SYSTEM user, potentially leading to further attacks within the affected system.",Intel,Driver & Support Assistant,7.8,HIGH,0.0006500000017695129,false,,false,false,false,,,false,false,,2024-05-03T03:16:00.000Z,0 CVE-2023-42099,https://securityvulnerability.io/vulnerability/CVE-2023-42099,Intel Driver & Support Assistant Link Following Local Privilege Escalation Vulnerability,"The Intel Driver & Support Assistant has a vulnerability that allows local attackers to escalate their privileges. This issue arises from a flaw in the DSA Service, which can be manipulated through the creation of a symbolic link. By leveraging this flaw, an attacker with access to execute low-privileged code can delete files and potentially escalate their privileges to execute arbitrary code in the context of the SYSTEM user. Proper measures should be taken to mitigate this vulnerability and protect the integrity of user systems.",Intel,Driver & Support Assistant,7.8,HIGH,0.0006500000017695129,false,,false,false,false,,,false,false,,2024-05-03T02:13:11.158Z,0 CVE-2023-41252,https://securityvulnerability.io/vulnerability/CVE-2023-41252,Intel QAT Software Drivers Vulnerability Could Lead to Denial of Service,"A vulnerability exists in certain versions of Intel(R) QuickAssist Technology (QAT) software drivers for Windows, where an out-of-bounds read could occur. This flaw may allow an authenticated user to exploit the software, potentially leading to a denial of service through local access. The issue is present in versions before QAT1.7-W-1.11.0. Organizations utilizing affected versions are advised to review their systems and consider applying available patches to mitigate the risk.",Intel,Intel(r) Qat Software Drivers For Windows,6.5,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-14T13:38:17.058Z,0 CVE-2023-33870,https://securityvulnerability.io/vulnerability/CVE-2023-33870,Insecure Inherited Permissions May Allow Escalation of Privilege via Local Access,"An issue exists in certain Intel Ethernet tools and driver installation software, where insecure inherited permissions may permit authenticated users to execute a privilege escalation attack. This vulnerability highlights the importance of proper permissions management in software deployment and the necessity for users to be cautious about their access and capabilities when using vulnerable products. Organizations are encouraged to review their installations and implement necessary patches or mitigations as outlined in the advisory.",Intel,Intel(r) Ethernet Tools And Driver Install Software,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-14T13:38:15.422Z,0 CVE-2023-39432,https://securityvulnerability.io/vulnerability/CVE-2023-39432,Potential Escalation of Privilege Vulnerability in Intel Ethernet Tools and Driver Install Software,"An improper access control issue exists in certain Intel Ethernet tools and driver installation software, which may allow an authenticated user to leverage local access for privilege escalation. This vulnerability poses potential risks to system integrity and data security, emphasizing the need for updates to impacted software versions. Solution availability and mitigation strategies are critical for users relying on this software for their network management.",Intel,"Intel(r) Ethernet Tools And Driver Install Software,",7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-14T13:38:14.830Z,0 CVE-2023-25174,https://securityvulnerability.io/vulnerability/CVE-2023-25174,Potential Escalation of Privilege Vulnerability in Intel Chipset Driver Software,"An improper access control vulnerability exists in Intel Chipset Driver Software versions earlier than 10.1.19444.8378. This issue could allow an authenticated user to exploit the vulnerability and potentially escalate their privileges through local access, posing a significant risk to system integrity and security. Proper remediation and updates are crucial to mitigate this risk.",Intel,Intel(R) Chipset Driver Software,6.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-14T13:37:53.709Z,0 CVE-2023-28739,https://securityvulnerability.io/vulnerability/CVE-2023-28739,Potential Escalation of Privilege via Local Access in Intel Chipset Driver Software,"The Intel Chipset Driver Software prior to version 10.1.19444.8378 contains incorrect default permissions, which may allow an authenticated user to escalate privileges through local access. This vulnerability can enable unauthorized users to manipulate system privileges, leading to potential risks in system security management. Intel provides detailed security advisory for remediation and updates on this issue.",Intel,Intel(r) Chipset Driver Software,6.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-14T13:37:53.192Z,0 CVE-2023-26591,https://securityvulnerability.io/vulnerability/CVE-2023-26591,Denial of Service Risk in Intel Thunderbolt DCH Drivers for Windows,"An unchecked return value vulnerability in certain versions of Intel Thunderbolt DCH drivers for Windows allows potential denial of service when exploited by an unauthenticated user with physical access to the system. This issue primarily affects Intel's Thunderbolt drivers prior to version 88, posing risks for users and organizations reliant on these drivers for secure connectivity. To mitigate potential impacts, it is advisable to update to the latest versions as recommended by Intel's security advisory.",Intel,Intel(r) Thunderbolt(tm) Dch Drivers For Windows,2,LOW,0.0004400000034365803,false,,false,false,false,,,false,false,,2024-02-14T13:37:49.450Z,0 CVE-2023-26596,https://securityvulnerability.io/vulnerability/CVE-2023-26596,Improper Access Control in Intel Thunderbolt DCH Drivers for Windows,"A vulnerability exists in the Intel Thunderbolt DCH drivers for Windows, where improper access control can potentially allow an authenticated user to disrupt system availability. This issue enables a scenario where local access could lead to denial of service conditions. Users and organizations utilizing these drivers should evaluate their systems and consider implementing mitigation strategies as recommended in the official security advisory.",Intel,Intel(r) Thunderbolt(tm) Dch Drivers For Windows,2.5,LOW,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-14T13:37:48.889Z,0 CVE-2023-27303,https://securityvulnerability.io/vulnerability/CVE-2023-27303,Improper Access Control in Intel Thunderbolt Drivers for Windows,"The vulnerability identified in Intel Thunderbolt DCH drivers for Windows allows improper access control, which can potentially lead to information disclosure. Authenticated users may exploit this flaw to access sensitive information through local access, raising concerns for system integrity and data security. Effective measures are necessary to mitigate potential risks associated with this vulnerability.",Intel,Intel(r) Thunderbolt(tm) Dch Drivers For Windows,3.8,LOW,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-14T13:37:48.307Z,0 CVE-2023-26592,https://securityvulnerability.io/vulnerability/CVE-2023-26592,Deserialization Vulnerability in Intel Thunderbolt DCH Drivers for Windows,"An issue exists in Intel Thunderbolt DCH drivers for Windows before version 88, relating to the deserialization of untrusted data. This vulnerability could allow an authenticated user to potentially exploit the flaw and trigger a denial of service via local access. Users of affected versions should take precautionary measures to mitigate potential risks and ensure system integrity.",Intel,Intel(r) Thunderbolt(tm) Dch Drivers For Windows,3.8,LOW,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-14T13:37:47.762Z,0 CVE-2023-27300,https://securityvulnerability.io/vulnerability/CVE-2023-27300,Improper Buffer Restrictions in Intel Thunderbolt DCH Drivers for Windows,"Improper buffer restrictions in specific Intel Thunderbolt DCH drivers for Windows prior to version 88 could allow an authenticated user to potentially gain access to sensitive information through local access. This vulnerability stems from inadequate handling of buffer restrictions, which raises concerns about information security for users with vulnerable driver versions. Users are encouraged to update their drivers to the latest version to mitigate this risk.",Intel,Intel(r) Thunderbolt(tm) Dch Drivers For Windows,3.8,LOW,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-14T13:37:47.252Z,0